Using Artificial Intelligence Capabilities for Cyber Attacks
Abstract
The article discover methods of organizing cyber attacks using artificial intelligence (AI) in the context of growing geopolitical tensions. The analysis of the use of AI by intruders for the subsequent development of protection systems is carried out. The applied method of analysis of MITRE and Lockheed Martin models, as well as considering real cases, make it possible to identify threat groups and techniques for using AI in cyber attacks. The authors substantiate the conclusion that it is necessary to create self-learning security systems against “combat AI”.
About the Authors
E. A. BogdanovRussian Federation
Evgenii A. Bogdanov - PhD (Math.), Head of the Department of Information Security, Faculty of Information Technology and Big Data Analysis
Moscow
G. A. Ostapenko
Russian Federation
Grigory A. Ostapenko - Doct. Sci. (Tech.), Prof., Vice-Rector for Digitalization
Moscow
R. S. Tanchuk
Russian Federation
Roman S. Tanchuk - Cand. Sci (Econ.), Deputy Dean for Relations with Russian and International Partners, Faculty of Information Technology and Big Data Analysis
Moscow
References
1. Ostapenko G.A., Vasilchenko A.P., Ostapenko A.A., et al. Automated knowledge bank and cyber attack risk and vulnerability calculator (part i). Information and Security. 2024;27(2):231-238. (In Russ.). DOI: 10.36622/1682-7813.2024.27.2.008
2. Ostapenko G.A., Vasilchenko A.P., Ostapenko A.A., et al. Formalization of knowledge and data of cyber attacks and vulnerabilities. Information and Security. 2024;27(2):231-238. (In Russ.). DOI: 10.36622/1682-7813.2024.27.2.008
3. Namiot D. E. About cyber attacks using artificial intelligence systems. International Journal of Open Information Technologies. 2024;12(9):132–141. URL: http://injoit.org/index.php/j1/article/view/1958 (In Russ.).
4. Nazaryan A. K., Kartsan I. N. Modern cyber attacks: classification and methods of protection. Computer science. Economy. Management — Informatics. Economics. Management. 2025;4(1):1001–1007. (In Russ.). DOI: 10.47813/2782–5280–2025–4–1–1001–1007
5. Guembe B., Azeta A., Misra S., Osamor V. C., Fernandez-Sanz L., Pospelova V. The Emerging Threat of Ai-driven Cyber Attacks: A Review, Applied Artificial Intelligence. 2022;36(1)1–34. DOI: 10.1080/08839514.2022.2037254
6. Kaloudi N., Li J. The AI-Based Cyber Threat Landscape: A Survey. ACM Computing Surveys (CSUR). 2020;53:1–34. DOI: 10.1145/3372823
7. Kotenko I. V., Khmyrov S. S. Analysis of models and techniques used to attribute cybersecurity violators in the implementation of targeted attacks. Cybersecurity issues. 2022;4(50):52–79. (In Russ.). DOI: 10.21681/2311-3456-2022-4-52-79
8. Pikalov P. A., Cyberbullying using artificial intelligence. Current issues in the fight against crime. 2024;2:56–59. URL: https://www.elibrary.ru/dqklru (In Russ.).
9. Langner R. To kill a centrifuge: A technical analysis of what stuxnet’s creators tried to achieve[J], 2013. 37 p. URL: https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf
10. Matyashova D. O. Comparative analysis of threats of malicious use of artificial intelligence for the political situation in Hong Kong and Taiwan. Skif. 2021;6(58):323–330. URL: https://www.elibrary.ru/phpcog (In Russ.).
11. Pantserev K. A. Malicious use of artificial intelligence in Sub-Saharan Africa: Challenges for Pan-African cybersecurity. Vestnik RUDN. International Relations, 2022;2:288–302. (In Russ.). DOI: 10.22363/2313–0660–2022–22–2–288–30
Review
For citations:
Bogdanov E.A., Ostapenko G.A., Tanchuk R.S. Using Artificial Intelligence Capabilities for Cyber Attacks. Digital Solutions and Artificial Intelligence Technologies. 2025;1(2):44-57. (In Russ.)
